Pub Date : 2024-05-10DOI: 10.1007/s00453-024-01232-5
Benjamin Doerr, Andrew James Kelley
We propose a new method based on discrete Fourier analysis to analyze the time evolutionary algorithms spend on plateaus. This immediately gives a concise proof of the classic estimate of the expected runtime of the ((1+1)) evolutionary algorithm on the Needle problem due to Garnier et al. (Evol Comput 7:173–203, 1999). We also use this method to analyze the runtime of the ((1+1)) evolutionary algorithm on a benchmark consisting of (n/ell ) plateaus of effective size (2^ell -1) which have to be optimized sequentially in a LeadingOnes fashion. Using our new method, we determine the precise expected runtime both for static and fitness-dependent mutation rates. We also determine the asymptotically optimal static and fitness-dependent mutation rates. For (ell = o(n)), the optimal static mutation rate is approximately 1.59/n. The optimal fitness dependent mutation rate, when the first k fitness-relevant bits have been found, is asymptotically (1/(k+1)). These results, so far only proven for the single-instance problem LeadingOnes, thus hold for a much broader class of problems. We expect similar extensions to be true for other important results on LeadingOnes. We are also optimistic that the Fourier analysis approach can be applied to other plateau problems as well.
{"title":"Fourier Analysis Meets Runtime Analysis: Precise Runtimes on Plateaus","authors":"Benjamin Doerr, Andrew James Kelley","doi":"10.1007/s00453-024-01232-5","DOIUrl":"10.1007/s00453-024-01232-5","url":null,"abstract":"<div><p>We propose a new method based on discrete Fourier analysis to analyze the time evolutionary algorithms spend on plateaus. This immediately gives a concise proof of the classic estimate of the expected runtime of the <span>((1+1))</span> evolutionary algorithm on the Needle problem due to Garnier et al. (Evol Comput 7:173–203, 1999). We also use this method to analyze the runtime of the <span>((1+1))</span> evolutionary algorithm on a benchmark consisting of <span>(n/ell )</span> plateaus of effective size <span>(2^ell -1)</span> which have to be optimized sequentially in a LeadingOnes fashion. Using our new method, we determine the precise expected runtime both for static and fitness-dependent mutation rates. We also determine the asymptotically optimal static and fitness-dependent mutation rates. For <span>(ell = o(n))</span>, the optimal static mutation rate is approximately 1.59/<i>n</i>. The optimal fitness dependent mutation rate, when the first <i>k</i> fitness-relevant bits have been found, is asymptotically <span>(1/(k+1))</span>. These results, so far only proven for the single-instance problem LeadingOnes, thus hold for a much broader class of problems. We expect similar extensions to be true for other important results on LeadingOnes. We are also optimistic that the Fourier analysis approach can be applied to other plateau problems as well.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2479 - 2518"},"PeriodicalIF":0.9,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-09DOI: 10.1007/s00453-024-01230-7
Steven Chaplick, Giordano Da Lozzo, Emilio Di Giacomo, Giuseppe Liotta, Fabrizio Montecchiani
The planar slope number({{,textrm{psn},}}(G)) of a planar graph G is the minimum number of edge slopes in a planar straight-line drawing of G. It is known that ({{,textrm{psn},}}(G) in O(c^{Delta })) for every planar graph G of maximum degree (Delta ). This upper bound has been improved to (O(Delta ^5)) if G has treewidth three, and to (O(Delta )) if G has treewidth two. In this paper we prove ({{,textrm{psn},}}(G) le max {4,Delta }) when G is a Halin graph, and thus has treewidth three. Furthermore, we present the first polynomial upper bound on the planar slope number for a family of graphs having treewidth four. Namely we show that (O(Delta ^2)) slopes suffice for nested pseudotrees.
已知对于每个最大度为 (Delta )的平面图 G,平面斜率数 ({{,textrm{psn},}}(G) in O(c^{Delta })) 为 O(c^{Delta })。如果 G 的树宽为三,那么这个上界将被改进为 (O(Delta ^5));如果 G 的树宽为二,那么这个上界将被改进为 (O(Delta ))。在本文中,我们证明了当 G 是一个哈林图,并且具有三树宽时,({{,textrm{psn},}}(G) le max {4,Delta })。此外,我们还首次提出了树宽为四的图族的平面斜率数的多项式上界。也就是说,我们证明了 (O(Delta ^2)) 斜率对于嵌套伪树来说是足够的。
{"title":"Planar Drawings with Few Slopes of Halin Graphs and Nested Pseudotrees","authors":"Steven Chaplick, Giordano Da Lozzo, Emilio Di Giacomo, Giuseppe Liotta, Fabrizio Montecchiani","doi":"10.1007/s00453-024-01230-7","DOIUrl":"10.1007/s00453-024-01230-7","url":null,"abstract":"<div><p>The <i>planar slope number</i> <span>({{,textrm{psn},}}(G))</span> of a planar graph <i>G</i> is the minimum number of edge slopes in a planar straight-line drawing of <i>G</i>. It is known that <span>({{,textrm{psn},}}(G) in O(c^{Delta }))</span> for every planar graph <i>G</i> of maximum degree <span>(Delta )</span>. This upper bound has been improved to <span>(O(Delta ^5))</span> if <i>G</i> has treewidth three, and to <span>(O(Delta ))</span> if <i>G</i> has treewidth two. In this paper we prove <span>({{,textrm{psn},}}(G) le max {4,Delta })</span> when <i>G</i> is a Halin graph, and thus has treewidth three. Furthermore, we present the first polynomial upper bound on the planar slope number for a family of graphs having treewidth four. Namely we show that <span>(O(Delta ^2))</span> slopes suffice for nested pseudotrees.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2413 - 2447"},"PeriodicalIF":0.9,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01230-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-09DOI: 10.1007/s00453-024-01231-6
Jianer Chen, Qin Huang, Iyad Kanj, Ge Xia
Based on well-known complexity theory conjectures, any polynomial-time kernelization algorithm for the NP-hard Line-Cover problem produces a kernel of size (Omega (k^2)), where k is the size of the sought line cover. Motivated by the current research in massive data processing, we study the existence of kernelization algorithms with limited space and time complexity for Line-Cover. We prove that every kernelization algorithm for Line-Cover takes time (Omega (n log k + k^2 log k)), and present a randomized kernelization algorithm for Line-Cover that produces a kernel of size bounded by (k^2), and runs in time ({mathcal {O}}(n log k + k^2 (log k log log k)^2)) and space ({mathcal {O}}(k^2log ^{2} k)). Our techniques are also useful for developing deterministic kernelization algorithms for Line-Cover with limited space and improved running time, and for developing streaming kernelization algorithms for Line-Cover with near-optimal update-time.
基于众所周知的复杂性理论猜想,任何针对 NP 难的线覆盖(Line-Cover)问题的多项式时间内核化算法都会产生一个大小为 (Omega (k^2)) 的内核,其中 k 是所求线覆盖的大小。受当前海量数据处理研究的启发,我们研究了针对 Line-Cover 问题是否存在空间和时间复杂度有限的内核化算法。我们证明了Line-Cover的每个内核化算法都需要花费时间(Omega (n log k + k^2 log k)),并提出了一种Line-Cover的随机内核化算法,它产生的内核大小以(k^2)为界、并且运行时间({mathcal {O}}(n log k + k^2 (log k log log k)^2))和空间({mathcal {O}}(k^2log ^{2} k))。我们的技术还有助于为 Line-Cover 开发空间有限、运行时间更短的确定性内核化算法,以及为 Line-Cover 开发更新时间接近最优的流式内核化算法。
{"title":"Nearly Time-Optimal Kernelization Algorithms for the Line-Cover Problem with Big Data","authors":"Jianer Chen, Qin Huang, Iyad Kanj, Ge Xia","doi":"10.1007/s00453-024-01231-6","DOIUrl":"10.1007/s00453-024-01231-6","url":null,"abstract":"<div><p>Based on well-known complexity theory conjectures, any polynomial-time kernelization algorithm for the NP-hard <span>Line-</span><span>Cover</span> problem produces a kernel of size <span>(Omega (k^2))</span>, where <i>k</i> is the size of the sought line cover. Motivated by the current research in massive data processing, we study the existence of kernelization algorithms with limited space and time complexity for <span>Line-</span><span>Cover</span>. We prove that every kernelization algorithm for <span>Line-Cover</span> takes time <span>(Omega (n log k + k^2 log k))</span>, and present a randomized kernelization algorithm for <span>Line-</span><span>Cover</span> that produces a kernel of size bounded by <span>(k^2)</span>, and runs in time <span>({mathcal {O}}(n log k + k^2 (log k log log k)^2))</span> and space <span>({mathcal {O}}(k^2log ^{2} k))</span>. Our techniques are also useful for developing deterministic kernelization algorithms for <span>Line-</span><span>Cover</span> with limited space and improved running time, and for developing streaming kernelization algorithms for <span>Line-</span><span>Cover</span> with near-optimal update-time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 8","pages":"2448 - 2478"},"PeriodicalIF":0.9,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-08DOI: 10.1007/s00453-024-01234-3
Magnús M. Halldórsson, Dror Rawitz
We study the Online Multiset Submodular Cover problem (OMSC), where we are given a universe U of elements and a collection of subsets (mathcal {S}subseteq 2^U). Each element (u_j in U) is associated with a nonnegative, nondecreasing, submodular polynomially computable set function (f_j). Initially, the elements are uncovered, and therefore we pay a penalty per each unit of uncovered element. Subsets with various coverage and cost arrive online. Upon arrival of a new subset, the online algorithm must decide how many copies of the arriving subset to add to the solution. This decision is irrevocable, in the sense that the algorithm will not be able to add more copies of this subset in the future. On the other hand, the algorithm can drop copies of a subset, but such copies cannot be retrieved later. The goal is to minimize the total cost of subsets taken plus penalties for uncovered elements. We present an (O(sqrt{rho _{max }}))-competitive algorithm for OMSC that does not dismiss subset copies that were taken into the solution, but relies on prior knowledge of the value of (rho _{max }), where (rho _{max }) is the maximum ratio, over all subsets, between the penalties covered by a subset and its cost. We provide an (Oleft( log (rho _{max }) sqrt{rho _{max }} right) )-competitive algorithm for OMSC that does not rely on advance knowledge of (rho _{max }) but uses dismissals of previously taken subsets. Finally, for the capacitated versions of the Online Multiset Multicover problem, we obtain an (O(sqrt{rho _{max }'}))-competitive algorithm when (rho _{max }') is known and an (Oleft( log (rho _{max }') sqrt{rho _{max }'} right) )-competitive algorithm when (rho _{max }') is unknown, where (rho _{max }') is the maximum ratio over all subset incarnations between the penalties covered by this incarnation and its cost.
{"title":"Online Multiset Submodular Cover","authors":"Magnús M. Halldórsson, Dror Rawitz","doi":"10.1007/s00453-024-01234-3","DOIUrl":"10.1007/s00453-024-01234-3","url":null,"abstract":"<div><p>We study the <span>Online Multiset Submodular Cover</span> problem (<span>OMSC</span>), where we are given a universe <i>U</i> of elements and a collection of subsets <span>(mathcal {S}subseteq 2^U)</span>. Each element <span>(u_j in U)</span> is associated with a nonnegative, nondecreasing, submodular polynomially computable set function <span>(f_j)</span>. Initially, the elements are uncovered, and therefore we pay a penalty per each unit of uncovered element. Subsets with various coverage and cost arrive online. Upon arrival of a new subset, the online algorithm must decide how many copies of the arriving subset to add to the solution. This decision is irrevocable, in the sense that the algorithm will not be able to add more copies of this subset in the future. On the other hand, the algorithm can drop copies of a subset, but such copies cannot be retrieved later. The goal is to minimize the total cost of subsets taken plus penalties for uncovered elements. We present an <span>(O(sqrt{rho _{max }}))</span>-competitive algorithm for <span>OMSC</span> that does not dismiss subset copies that were taken into the solution, but relies on prior knowledge of the value of <span>(rho _{max })</span>, where <span>(rho _{max })</span> is the maximum ratio, over all subsets, between the penalties covered by a subset and its cost. We provide an <span>(Oleft( log (rho _{max }) sqrt{rho _{max }} right) )</span>-competitive algorithm for <span>OMSC</span> that does not rely on advance knowledge of <span>(rho _{max })</span> but uses dismissals of previously taken subsets. Finally, for the capacitated versions of the <span>Online Multiset Multicover</span> problem, we obtain an <span>(O(sqrt{rho _{max }'}))</span>-competitive algorithm when <span>(rho _{max }')</span> is known and an <span>(Oleft( log (rho _{max }') sqrt{rho _{max }'} right) )</span>-competitive algorithm when <span>(rho _{max }')</span> is unknown, where <span>(rho _{max }')</span> is the maximum ratio over all subset incarnations between the penalties covered by this incarnation and its cost.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2393 - 2411"},"PeriodicalIF":0.9,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01234-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140927775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-27DOI: 10.1007/s00453-024-01218-3
Per Kristian Lehre
Co-evolutionary algorithms have a wide range of applications, such as in hardware design, evolution of strategies for board games, and patching software bugs. However, these algorithms are poorly understood and applications are often limited by pathological behaviour, such as loss of gradient, relative over-generalisation, and mediocre objective stasis. It is an open challenge to develop a theory that can predict when co-evolutionary algorithms find solutions efficiently and reliable. This paper provides a first step in developing runtime analysis for population-based competitive co-evolutionary algorithms. We provide a mathematical framework for describing and reasoning about the performance of co-evolutionary processes. To illustrate the framework, we introduce a population-based co-evolutionary algorithm called PDCoEA, and prove that it obtains a solution to a bilinear maximin optimisation problem in expected polynomial time. Finally, we describe settings where PDCoEA needs exponential time with overwhelmingly high probability to obtain a solution.
{"title":"Runtime Analysis of Competitive Co-evolutionary Algorithms for Maximin Optimisation of a Bilinear Function","authors":"Per Kristian Lehre","doi":"10.1007/s00453-024-01218-3","DOIUrl":"10.1007/s00453-024-01218-3","url":null,"abstract":"<div><p>Co-evolutionary algorithms have a wide range of applications, such as in hardware design, evolution of strategies for board games, and patching software bugs. However, these algorithms are poorly understood and applications are often limited by pathological behaviour, such as loss of gradient, relative over-generalisation, and mediocre objective stasis. It is an open challenge to develop a theory that can predict when co-evolutionary algorithms find solutions efficiently and reliable. This paper provides a first step in developing runtime analysis for population-based competitive co-evolutionary algorithms. We provide a mathematical framework for describing and reasoning about the performance of co-evolutionary processes. To illustrate the framework, we introduce a population-based co-evolutionary algorithm called PDCoEA, and prove that it obtains a solution to a bilinear maximin optimisation problem in expected polynomial time. Finally, we describe settings where PDCoEA needs exponential time with overwhelmingly high probability to obtain a solution.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2352 - 2392"},"PeriodicalIF":0.9,"publicationDate":"2024-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01218-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140812477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-16DOI: 10.1007/s00453-024-01226-3
Johannes Lengler, Andre Opris, Dirk Sudholt
Population diversity is crucial in evolutionary algorithms as it helps with global exploration and facilitates the use of crossover. Despite many runtime analyses showing advantages of population diversity, we have no clear picture of how diversity evolves over time. We study how the population diversity of ((mu +1)) algorithms, measured by the sum of pairwise Hamming distances, evolves in a fitness-neutral environment. We give an exact formula for the drift of population diversity and show that it is driven towards an equilibrium state. Moreover, we bound the expected time for getting close to the equilibrium state. We find that these dynamics, including the location of the equilibrium, are unaffected by surprisingly many algorithmic choices. All unbiased mutation operators with the same expected number of bit flips have the same effect on the expected diversity. Many crossover operators have no effect at all, including all binary unbiased, respectful operators. We review crossover operators from the literature and identify crossovers that are neutral towards the evolution of diversity and crossovers that are not.
{"title":"Analysing Equilibrium States for Population Diversity","authors":"Johannes Lengler, Andre Opris, Dirk Sudholt","doi":"10.1007/s00453-024-01226-3","DOIUrl":"10.1007/s00453-024-01226-3","url":null,"abstract":"<div><p>Population diversity is crucial in evolutionary algorithms as it helps with global exploration and facilitates the use of crossover. Despite many runtime analyses showing advantages of population diversity, we have no clear picture of how diversity evolves over time. We study how the population diversity of <span>((mu +1))</span> algorithms, measured by the sum of pairwise Hamming distances, evolves in a fitness-neutral environment. We give an exact formula for the drift of population diversity and show that it is driven towards an equilibrium state. Moreover, we bound the expected time for getting close to the equilibrium state. We find that these dynamics, including the location of the equilibrium, are unaffected by surprisingly many algorithmic choices. All unbiased mutation operators with the same expected number of bit flips have the same effect on the expected diversity. Many crossover operators have no effect at all, including all binary unbiased, respectful operators. We review crossover operators from the literature and identify crossovers that are neutral towards the evolution of diversity and crossovers that are not.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2317 - 2351"},"PeriodicalIF":0.9,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01226-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140613146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-12DOI: 10.1007/s00453-024-01228-1
Jan Bok, Richard C. Brewster, Pavol Hell, Nikola Jedličková, Arash Rafiey
Since the CSP dichotomy conjecture has been established, a number of other dichotomy questions have attracted interest, including one for list homomorphism problems of signed graphs. Signed graphs arise naturally in many contexts, including for instance nowhere-zero flows for graphs embedded in non-orientable surfaces. The dichotomy classification is known for homomorphisms without list restrictions, so it is surprising that it is not known, or even conjectured, if lists are present since this usually makes the classifications easier to obtain. There is however a conjectured classification, due to Kim and Siggers, in the special case of “semi-balanced” signed graphs. These authors confirmed their conjecture for the class of reflexive signed graphs. As our main result we verify the conjecture for irreflexive signed graphs. For this purpose, we prove an extension result for two-directional ray graphs which is of independent interest and which leads to an analogous extension result for interval graphs. Moreover, we offer an alternative proof for the class of reflexive signed graphs, and a direct polynomial-time algorithm in the polynomial cases where the previous algorithms used algebraic methods of general CSP dichotomy theorems. For both reflexive and irreflexive cases the dichotomy classification depends on a result linking the absence of certain structures to the existence of a special ordering. The structures are used to prove the NP-completeness and the ordering is used to design polynomial algorithms.
{"title":"Min Orderings and List Homomorphism Dichotomies for Graphs and Signed Graphs","authors":"Jan Bok, Richard C. Brewster, Pavol Hell, Nikola Jedličková, Arash Rafiey","doi":"10.1007/s00453-024-01228-1","DOIUrl":"10.1007/s00453-024-01228-1","url":null,"abstract":"<div><p>Since the CSP dichotomy conjecture has been established, a number of other dichotomy questions have attracted interest, including one for list homomorphism problems of signed graphs. Signed graphs arise naturally in many contexts, including for instance nowhere-zero flows for graphs embedded in non-orientable surfaces. The dichotomy classification is known for homomorphisms without list restrictions, so it is surprising that it is not known, or even conjectured, if lists are present since this usually makes the classifications easier to obtain. There is however a conjectured classification, due to Kim and Siggers, in the special case of “semi-balanced” signed graphs. These authors confirmed their conjecture for the class of reflexive signed graphs. As our main result we verify the conjecture for irreflexive signed graphs. For this purpose, we prove an extension result for two-directional ray graphs which is of independent interest and which leads to an analogous extension result for interval graphs. Moreover, we offer an alternative proof for the class of reflexive signed graphs, and a direct polynomial-time algorithm in the polynomial cases where the previous algorithms used algebraic methods of general CSP dichotomy theorems. For both reflexive and irreflexive cases the dichotomy classification depends on a result linking the absence of certain structures to the existence of a special ordering. The structures are used to prove the NP-completeness and the ordering is used to design polynomial algorithms.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2289 - 2316"},"PeriodicalIF":0.9,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140602306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-06DOI: 10.1007/s00453-024-01227-2
Sriram Bhyravarapu, Tim A. Hartmann, Hung P. Hoang, Subrahmanyam Kalyanasundaram, I. Vinod Reddy
A conflict-free coloring of a graph G is a (partial) coloring of its vertices such that every vertex u has a neighbor whose assigned color is unique in the neighborhood of u. There are two variants of this coloring, one defined using the open neighborhood and one using the closed neighborhood. For both variants, we study the problem of deciding whether the conflict-free coloring of a given graph G is at most a given number k.
In this work, we investigate the relation of clique-width and minimum number of colors needed (for both variants) and show that these parameters do not bound one another. Moreover, we consider specific graph classes, particularly graphs of bounded clique-width and types of intersection graphs, such as distance hereditary graphs, interval graphs and unit square and disk graphs. We also consider Kneser graphs and split graphs. We give (often tight) upper and lower bounds and determine the complexity of the decision problem on these graph classes, which improve some of the results from the literature. Particularly, we settle the number of colors needed for an interval graph to be conflict-free colored under the open neighborhood model, which was posed as an open problem.
摘要 图 G 的无冲突着色是其顶点的(部分)着色,即每个顶点 u 都有一个邻居,其分配的颜色在 u 的邻域中是唯一的。对于这两种变体,我们研究的问题都是确定给定图 G 的无冲突着色是否最多为给定数 k。在这项工作中,我们研究了(对于这两种变体)簇宽和所需颜色的最小数量之间的关系,并证明这些参数并不相互约束。此外,我们还考虑了特定的图类,特别是有界剪辑宽度的图和交集图类型,如距离遗传图、区间图、单位方形和圆盘图。我们还考虑了 Kneser 图和分裂图。我们给出了(通常很紧)上下限,并确定了这些图类的决策问题的复杂性,从而改进了文献中的一些结果。特别是,我们解决了开放邻域模型下区间图无冲突着色所需的颜色数,这曾是一个开放问题。
{"title":"Conflict-Free Coloring: Graphs of Bounded Clique-Width and Intersection Graphs","authors":"Sriram Bhyravarapu, Tim A. Hartmann, Hung P. Hoang, Subrahmanyam Kalyanasundaram, I. Vinod Reddy","doi":"10.1007/s00453-024-01227-2","DOIUrl":"10.1007/s00453-024-01227-2","url":null,"abstract":"<div><p>A conflict-free coloring of a graph <i>G</i> is a (partial) coloring of its vertices such that every vertex <i>u</i> has a neighbor whose assigned color is unique in the neighborhood of <i>u</i>. There are two variants of this coloring, one defined using the open neighborhood and one using the closed neighborhood. For both variants, we study the problem of deciding whether the conflict-free coloring of a given graph <i>G</i> is at most a given number <i>k</i>.</p><p>In this work, we investigate the relation of clique-width and minimum number of colors needed (for both variants) and show that these parameters do not bound one another. Moreover, we consider specific graph classes, particularly graphs of bounded clique-width and types of intersection graphs, such as distance hereditary graphs, interval graphs and unit square and disk graphs. We also consider Kneser graphs and split graphs. We give (often tight) upper and lower bounds and determine the complexity of the decision problem on these graph classes, which improve some of the results from the literature. Particularly, we settle the number of colors needed for an interval graph to be conflict-free colored under the open neighborhood model, which was posed as an open problem.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2250 - 2288"},"PeriodicalIF":0.9,"publicationDate":"2024-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-03DOI: 10.1007/s00453-024-01219-2
Daniel Hader, Matthew J. Patitz
Motivated by applications in DNA-nanotechnology, theoretical investigations in algorithmic tile-assembly have blossomed into a mature theory. In addition to computational universality, the abstract Tile Assembly Model (aTAM) was shown to be intrinsically universal (FOCS 2012), a strong notion of completeness where a single tile set is capable of simulating the full dynamics of all systems within the model; however, this construction fundamentally required non-deterministic tile attachments. This was confirmed necessary when it was shown that the class of directed aTAM systems, those where all possible sequences of tile attachments result in the same terminal assembly, is not intrinsically universal (FOCS 2016). Furthermore, it was shown that the non-cooperative aTAM, where tiles only need to match on 1 side to bind rather than 2 or more, is not intrinsically universal (SODA 2014) nor computationally universal (STOC 2017). Building on these results to further investigate the other dynamics, Hader et al. examined several tile-assembly models which varied across (1) the numbers of dimensions used, (2) how tiles diffused through space, and (3) whether each system is directed, and determined which models exhibited intrinsic universality (SODA 2020). In this paper we extend those results to provide direct comparisons of the various models against each other by considering intrinsic simulations between models. Our results show that in some cases, one model is strictly more powerful than another, and in others, pairs of models have mutually exclusive capabilities. This paper is a greatly expanded version of that which appeared in ICALP 2023.
{"title":"The Impacts of Dimensionality, Diffusion, and Directedness on Intrinsic Cross-Model Simulation in Tile-Based Self-Assembly","authors":"Daniel Hader, Matthew J. Patitz","doi":"10.1007/s00453-024-01219-2","DOIUrl":"10.1007/s00453-024-01219-2","url":null,"abstract":"<div><p>Motivated by applications in DNA-nanotechnology, theoretical investigations in algorithmic tile-assembly have blossomed into a mature theory. In addition to computational universality, the abstract Tile Assembly Model (aTAM) was shown to be intrinsically universal (FOCS 2012), a strong notion of completeness where a single tile set is capable of simulating the full dynamics of all systems within the model; however, this construction fundamentally required non-deterministic tile attachments. This was confirmed necessary when it was shown that the class of directed aTAM systems, those where all possible sequences of tile attachments result in the same terminal assembly, is not intrinsically universal (FOCS 2016). Furthermore, it was shown that the non-cooperative aTAM, where tiles only need to match on 1 side to bind rather than 2 or more, is not intrinsically universal (SODA 2014) nor computationally universal (STOC 2017). Building on these results to further investigate the other dynamics, Hader et al. examined several tile-assembly models which varied across (1) the numbers of dimensions used, (2) how tiles diffused through space, and (3) whether each system is directed, and determined which models exhibited intrinsic universality (SODA 2020). In this paper we extend those results to provide direct comparisons of the various models against each other by considering intrinsic simulations between models. Our results show that in some cases, one model is strictly more powerful than another, and in others, pairs of models have mutually exclusive capabilities. This paper is a greatly expanded version of that which appeared in ICALP 2023.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2211 - 2249"},"PeriodicalIF":0.9,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01219-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140586234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-29DOI: 10.1007/s00453-024-01220-9
Vít Jelínek, Michal Opler, Pavel Valtr
A permutation (pi ) is a merge of a permutation (sigma ) and a permutation (tau ), if we can color the elements of (pi ) red and blue so that the red elements have the same relative order as (sigma ) and the blue ones as (tau ). We consider, for fixed hereditary permutation classes (mathcal {C}) and (mathcal {D}), the complexity of determining whether a given permutation (pi ) is a merge of an element of (mathcal {C}) with an element of (mathcal {D}). We develop general algorithmic approaches for identifying polynomially tractable cases of merge recognition. Our tools include a version of streaming recognizability of permutations via polynomially constructible nondeterministic automata, as well as a concept of bounded width decomposition, inspired by the work of Ahal and Rabinovich. As a consequence of the general results, we can provide nontrivial examples of tractable permutation merges involving commonly studied permutation classes, such as the class of layered permutations, the class of separable permutations, or the class of permutations avoiding a decreasing sequence of a given length. On the negative side, we obtain a general hardness result which implies, for example, that it is NP-complete to recognize the permutations that can be merged from two subpermutations avoiding the pattern 2413.
{"title":"Generalized Coloring of Permutations","authors":"Vít Jelínek, Michal Opler, Pavel Valtr","doi":"10.1007/s00453-024-01220-9","DOIUrl":"10.1007/s00453-024-01220-9","url":null,"abstract":"<div><p>A permutation <span>(pi )</span> is a <i>merge</i> of a permutation <span>(sigma )</span> and a permutation <span>(tau )</span>, if we can color the elements of <span>(pi )</span> red and blue so that the red elements have the same relative order as <span>(sigma )</span> and the blue ones as <span>(tau )</span>. We consider, for fixed hereditary permutation classes <span>(mathcal {C})</span> and <span>(mathcal {D})</span>, the complexity of determining whether a given permutation <span>(pi )</span> is a merge of an element of <span>(mathcal {C})</span> with an element of <span>(mathcal {D})</span>. We develop general algorithmic approaches for identifying polynomially tractable cases of merge recognition. Our tools include a version of streaming recognizability of permutations via polynomially constructible nondeterministic automata, as well as a concept of bounded width decomposition, inspired by the work of Ahal and Rabinovich. As a consequence of the general results, we can provide nontrivial examples of tractable permutation merges involving commonly studied permutation classes, such as the class of layered permutations, the class of separable permutations, or the class of permutations avoiding a decreasing sequence of a given length. On the negative side, we obtain a general hardness result which implies, for example, that it is NP-complete to recognize the permutations that can be merged from two subpermutations avoiding the pattern 2413.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 7","pages":"2174 - 2210"},"PeriodicalIF":0.9,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140602087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}